Skip to content

Latest commit

 

History

History
12 lines (9 loc) · 1020 Bytes

firewall.md

File metadata and controls

12 lines (9 loc) · 1020 Bytes

Recommended Firewall Setup (Worker)

This is how I typically configure the firewall on redlure-workers, although it may vary depending on your use case.

If you are interested in the recommended firewall setup for the redlure-console, it can be found here.

Basics to consider:

  • Target access to your phishing sites - make sure to allow access to all ports you intend to host phishing sites from. In the example below I've allowed 80,443 and 4443.
  • Let's Encrypt - workers can generate Let's Encrypt certs for you, remotely, using certbot, but this requires access to port 80.
  • SSH access - you'll need to perform setup and may want to check logs. Ideally SSH access is limited to your own VPN or infrastructure.
  • redlure-console communications - perhaps most importantly, the redlure-console you connect the worker to will need to be able communicate inbound on the port the worker API is hosted on (4445 by default).